Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for connecting network for high-security information system

A technology for network connection and security information, which is applied to computer security devices, instruments, program loading/starting, etc., and can solve problems such as illegal tampering of web pages, unsolved network problems, and unsolved problems.

Inactive Publication Date: 2010-06-30
BEIJING PAIRUIGEN SCI & TECH DEV
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The applicant of the present invention filed the application number 200710177690.8 on November 20, 2007. The title of the invention is "A Method and Device for Preventing Computer Viruses" and has been awarded Although the patent application for invention patent rights has solved the problem of cutting off the way of virus transmission, it still has not solved the network problems caused by hacker attacks, especially the problem of illegal tampering of web pages.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for connecting network for high-security information system
  • Method for connecting network for high-security information system
  • Method for connecting network for high-security information system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0186] In order to enable those skilled in the art to better understand the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0187] Because the information system controls the hardware resources of the information system based on operating instructions: storage data, reading data, calculation processing, etc. When these operating instructions are compiled according to the specific functions, the function set becomes the software of the information system. People control the hardware resources of the information system through software, which also includes reading and writing operations on the software stored in the information system. Computer viruses and hacker programs also operate or control the hardware resources of the information system through the operating instructions supported by the information system, so that the information system runs in the desired way of the compu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for connecting network for a high-security information system. The high-security information system comprises an information processing component, a controlling component, a storing component and a network component. The controlling component comprises a hardware switch; at least one control signal line of the information processing component for carrying out the write operation for the second storing component is connected with the second storing component through the controlling component; when the hardware switch is in the first state, the controlling component cuts off the connection of the control signal and the signal line of the second storing component; and when the hardware switch is in the second state, the controlling component keeps the connection of the control signal and the signal line of the second storing component. The method for connecting network for the high-security information system comprises the following steps: operating the hardware switch to make the hardware switch in the first state; reading the code for the network connection program from the second storing component by the information processing component and storing the code for the network connection program in the storing space of the information processing component; and operating the code for the network connection program in the storing space of the information processing component by the information processing component to connect the network for the high-security information system.

Description

technical field [0001] The invention relates to a network connection method of a high security information system, in particular to a network connection method of a security information system which prevents computer virus invasion and computer hacker attack by adopting a method of controlling hardware connection signals between a processor and a storage body. Background technique [0002] Explanation of terminology: The computer virus or virus mentioned in the present invention all have the same meaning, including adopting the clear definition in the "Computer Information System Security Protection Regulations of the People's Republic of China", that is, a computer virus "refers to compiling or inserting A set of computer instructions or program codes that destroy computer functions or data, affect the use of computers and are capable of self-replication”; also include those inserted into information systems other than computers that destroy information system functions or d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/22G06F9/445G06F21/57
Inventor 须清
Owner BEIJING PAIRUIGEN SCI & TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products